A survey on device fingerprinting approach for resource-constraint IoT devices: comparative study and research challenges

RR Chowdhury, PE Abas - Internet of Things, 2022 - Elsevier
Modernization and technological advancement have made smart and convenient living
environments, including smart houses and smart cities, possible, by combining the Internet …

GraphNEI: A GNN-based network entity identification method for IP geolocation

Z Ma, S Zhang, N Li, T Li, X Hu, H Feng, Q Zhou, F Liu… - Computer Networks, 2023 - Elsevier
Network entity geolocation technology is a technique for inferring geographic location
through features such as network measurements or IP address searchable information, also …

A deep learning approach for classifying network connected IoT devices using communication traffic characteristics

RR Chowdhury, AC Idris, PE Abas - Journal of Network and Systems …, 2023 - Springer
Abstract The Internet of Things can be considered a technological revolution and has
successfully merged the physical world with the digital world. However, heterogeneous IoT …

AI‐Enabled Learning Architecture Using Network Traffic Traces over IoT Network: A Comprehensive Review

N Aneja, S Aneja, B Bhargava - Wireless Communications and …, 2023 - Wiley Online Library
WiFi and private 5G networks, commonly referred to as P5G, provide Internet of Things (IoT)
devices the ability to communicate at fast speeds, with low latency and with a high capacity …

Identifying SH-IoT devices from network traffic characteristics using random forest classifier

RR Chowdhury, AC Idris, PE Abas - Wireless Networks, 2024 - Springer
In the cyberspace, device identification has become one of the most important factors in
improving security of a network, containing both Internet of Things (IoT) and non-IoT devices …

Device identification using optimized digital footprints

RR Chowdhury, AC Idris, PE Abas - arXiv preprint arXiv:2212.04354, 2022 - arxiv.org
The rapidly increasing number of internet of things (IoT) and non-IoT devices has imposed
new security challenges to network administrators. Accurate device identification in the …

Defense against adversarial attacks on deep convolutional neural networks through nonlocal denoising

S Aneja, N Aneja, PE Abas, AG Naim - arXiv preprint arXiv:2206.12685, 2022 - arxiv.org
Despite substantial advances in network architecture performance, the susceptibility of
adversarial attacks makes deep learning challenging to implement in safety-critical …

Open-set specific emitter identification based on prototypical networks and extreme value theory

C Wang, Y Wang, Y Zhang, H Xu, Z Zhang - Applied Sciences, 2023 - mdpi.com
Much research has focused on classification within a closed set of emitters, while emitters
outside this closed set are misclassified. This paper proposes an open-set recognition …

Packet-level and IEEE 802.11 MAC frame-level analysis for IoT device identification

RR Chowdhury, AC Idris… - Turkish Journal of …, 2022 - journals.tubitak.gov.tr
In cyberspace, a large number of Internet of Things (IoT) devices from different
manufacturers with hetero-geneous functionalities are connected together. It is challenging …

Deep learning-based modified-EAST scene text detector: insights from a novel multiscript dataset

S Mahajan, R Rani, A Kamboj - International Journal on Document …, 2024 - Springer
The field of computer vision has seen significant transformation with the emergence and
advancement of deep learning models. Deep learning waves have a significant impact on …